Home World News The $75 Radio: Why US Special Operations Command Needs to Buy Off the Shelf for the Next War

The $75 Radio: Why US Special Operations Command Needs to Buy Off the Shelf for the Next War

US Special Operations Command must supplement expensive, high-signature military radios with disposable, low-power commercial-off-the-shelf (COTS) technologies like LoRa radios to compete with peer competitors. By utilizing the unlicensed sub-gigahertz spectrum and chirp spread spectrum modulation, these “electronic ghosts” allow operators to camouflage their electromagnetic footprint within civilian noise floors, effectively evading AI-driven detection. This organically built cheap solution is a strategic necessity for maintaining communication resilience and invisibility within an adversary’s weapons engagement zone. 

The Case for Low-Signature, Low-Cost Communication 

On any given day, unnumbered United States special operations force teams rely on exquisite satellite communications and sophisticated military radios that cost tens of thousands of dollars. They are the most advanced communications systems money can buy—and they are all perfectly tuned for a fight that the United States military no longer wages. These systems are signature-heavy, easy to detect, and can be targeted within minutes of identification. Against a peer competitor like China or Russia, these highly reliable but highly powered systems become catastrophic liabilities when faced with the harsh realities of denied, degraded, intermittent, and low-bandwidth (DDIL) environments. The Marine Corps Operating Concept offers a stark summary of this reality: To be detected is to be targeted is to be killed.” 

This article argues that the fastest and cheapest way for special operations forces to survive against peer threats in conflict is to augment their traditional communication gear with disposable, low-probability-of-detection commercial-off-the-shelf radios like those from the Long-Range (LoRa) Wide Area Network technology, enabling them to communicate while remaining unseen. 

Augment Special Operators with Disposability 

The problem stems from the United States military’s overarching acquisition strategy that prioritizes high-cost, centralized systems that are too valuable to lose but too loud to use in a high-threat area. The next war demands a fundamental change in mindset: special operations forces must prioritize communication-resilience through mass adoption of commercial-off-the-shelf technology.  

A strategic advantage of LoRa for the US Military is that while it holds similar supply chain vulnerabilities as the high-end AI semiconductor world, it has significantly fewer technological and manufacturing limitations. Currently, high-volume LoRa silicon is currently fabricated offshore, however there is a warm base for domestic production. The underlying intellectual property is American-owned (Semtech) and there are other available foundries producing similar mature-node analog and RF chips, like Onsemi’s Gresham, Oregon facility or Tower Semiconductor’s facilities in Newport Beach and San Antonio, as well as additional international facilities that could be retooled with enough stimulus. By leveraging the recently launched Project Vault to stockpile refined strategic minerals, the Defense Department can stabilize its supply chain and stimulate domestic production at trusted foundries, thus bypassing the security concerns associated with other COTS devices originating in China. 

Special Operations Forces Acquisition, Technology, and Logistics is uniquely positioned and empowered to cut through the Department of Defense’s red tape and the multi-year process of product evolution through technology readiness levels. It is the only non-service entity within the Department of Defense with the mandate and agility to bypass this systemic friction. The Bottom Line: United States Special Operations Command should immediately field low-power, wide-area network technologies, like LoRa, to every deployable team. Purchasing and testing in competition enables winning in conflict. 

This article is not a proposal to replace the military’s most secure systems. However, it is a charge to augment those systems with an expedient, disposable, low-probability-of-detection layer in the primary-alternate-contingency-emergency communications plan, when the existing primary tools are shut down or compromised. If an adversary can detect a $50,000 radio using traditional military waveforms, the solution is likely not a $100,000 radio; it’s an in-house programmable chip that transmits an extremely quiet signal where they aren’t looking and is cheap enough to throw away. 

Moreover, in the Long-Range peer-to-peer construct, the self-healing mobile ad hoc mesh network, these systems are particularly viable for enabling partner force and civilian/surrogate-to-special operator links. A special operator can hand over a mesh-ready out-of-the-box device that has the same digital footprint of their operating area, because it is commercially available almost globally. The concept of camouflaging one’s electromagnetic footprint is achieved because of the frequency band that these radios are transmitting in: the unlicensed sub-gigahertz industrial, scientific, and medical (ISM) band of the spectrum that already contains copious amounts of civilian traffic. Via an open-source plug-in, the radios can feed positioning coordinates, text, and other cursor-on-target data directly into the widely adopted Tactical Assault Kit common operating picture framework. This seamless integration into the standardized headquarters’ battlefield picture and graceful degradation through self-healing mesh networks make them a go-to for tactical level communications.  

The First Island Chain: A Scenario in Contrasts 

To understand the difference between current military standards and a low-power, civilian-based approach, consider a simplified, potential future scenario in the first island chain during a Chinese blockade of Taiwan (Fall 2027). The environment is physically isolated and electromagnetically denied. Two special reconnaissance teams—Team 1 (using commercial Long-Range wide area network radios) and Team 2 (using the Army Navy / Personal Radio Communicator-163 handheld radio by L3Harris)—must immediately report the location of Chinese Anti-ship Missile System launch sites to Joint Force Headquarters. 

Team 1 (The Ghost): 

An operator with Team 1 mitigates his electromagnetic signature by reducing the power on his commercial LoRa radio to 10 milliwatts. Utilizing terrain shielding and directional antennas, the operator sends his reconnaissance report to his higher command. The highly directional and low-powered nature of the transmission safely limits its spread and keeps it below the detection capabilities of the People’s Armed Forces Maritime Militia conducting electromagnetic monitoring around the team’s operating area. The transmission is successful, acknowledged by Joint Force Headquarters, and the team remains undetected.  

Team 2 (The Target): 

An operator with Team 2 sets his standard military radio (e.g., Harris Falcon III) to the lowest possible power setting. The minimum transmit power is 250 milliwatts, 25 times larger than Team 1’s LoRa radio. The operator sends a digital voice transmission, shortening it to only three seconds. The message is received by the Joint Force Headquarters, but unbeknownst to Team 2, their message is detected and triangulated due to its relatively higher power compared to the background noise. Five minutes later, a Signals-based Threat Warning Receiver alarms. Team 2 is targeted, and the element is immediately forced to abort its mission and begin a high-risk extraction, having been compromised within the Weapons Engagement Zone. 

The tragic outcome for Team 2, while hypothetical, demonstrates real vulnerabilities of modern military radio systems. While secure against interception, they are simply too loud to be viable options for special operations forces operating inside the weapons engagement zone. 

The Artificial Intelligence Challenge: Hiding is Harder Than Ever 

The consensus is that both low probability of detection/interception hardware and tradecraft need to be implemented in concert to ensure mission success. Unfortunately, signature management is an increasingly complex issue. The rise of artificial intelligence and machine learning has given state actors another significant leg up in analyzing and categorizing the electromagnetic environment. In the conceptually similar realm of radar system detection, advanced electronic intelligence systems now utilize machine learning algorithms to achieve high-speed, high-accuracy emitter identification. Where traditional systems relied on pre-defined threat libraries and basic parameter input for anomaly identification, artificial intelligence models can now process massive troves of spectrum data to identify foreign signals that non-learning systems could miss. The radio frequency identification community can then relatively simply build upon the foundation presented by the radar and air defense communities. 

Researchers at China’s Hainan University used an artificial intelligence model to methodically categorize the existing electromagnetic environment in real-time, establishing baselines for all normal radio traffic and identifying anomalies. These models were applied in the cognitive radio construct, actively adapting a radio’s transmission parameters to the changing electromagnetic environment to reduce signal corruption and increase transmission success rates. However, it is not a far cry to take the same or similar efficiency-focused artificial intelligence model and use it in a signals analysis capacity to identify unknown, foreign, and potentially adversary-based transmissions.  

If any nation has the capacity to develop an artificial intelligence model with near ubiquitous technical surveillance, it’s China. The Chinese Communist Party can easily augment Skynet and Sharp Eyes, the surveillance systems used to suppress the Uyghurs in Xinjiang, with a dragnet of digital sensors oriented on identifying western forces during conflict. The People’s Liberation Army could make a moderate investment in the creation of thousands of field-expedient spectrum analyzers, such as low-cost Software-Defined Radios made from reasonably sensitive sensors and computers, and mandate their employment on every People’s Armed Forces Maritime Militia vessel throughout the entire East China Sea. At a cost of approximately $250 per device, these systems drastically lower the technical and practical barrier for mass spectrum analysis and could be employed on every state and private vessel. Once the People’s Liberation Army has sufficiently categorized the spectrum environment of critical areas inside their weapons engagement zone, a properly trained artificial intelligence model could be reuploaded to the swath of deployed devices to look for western radio signatures. This creates a cheap, near-ubiquitous, distributed detection network that is far more difficult to evade than the equivalent investment in first-rate specialized signals intelligence equipment and personnel. 

The potential convergence of a highly trained spectrum analysis model with an enormous dragnet of digital measuring devices means that special operations forces cannot expect a standard-issued radio categorized as “low probability of detection” the year it came off the production line to maintain the same depth of undetectability a year or more later, especially as the rate that new AI model’s computing capacity continues to drastically increase. The good news: In the ever-encroaching realm of ubiquitous technical surveillance, sensing is not always seeing, and my proposed solution is hiding in plain sight. 

The Hidden Advantage of Low-Power Networks and Tradecraft 

This is where technologies originally designed for the Internet of Things, like LoRa, offer a tactical edge by delivering distinct advantages over high-power, low-volume systems: 

  1. Low probability of detection via processing gain: LoRa radios utilize chirp spread spectrum modulation, which trades a modest data rate for high processing gain. This spreads the signal energy across a wide bandwidth, driving the signal-to-noise ratio deep into negative values and transmitting power below the ambient noise floor of standard electronic warfare receivers. This low detectability is further compounded by the system’s ability to operate at extremely low power levels, below 10 milliwatts, beyond 25 times lower than the standard dismounted military radio’s minimum transmit power. Furthermore, a forthcoming research publication by the Naval Postgraduate School indicates that when non-technical operational security techniques like intentional terrain masking and portable directional antennas are used, the probability of detection decreases even further. 
  1. Operational security through ubiquity: By transmitting in the unlicensed sub-gigahertz industrial, scientific, and medical band, the radio signature is camouflaged, blending in with copious amounts of existing civilian traffic. Hiding a foreign transmission in an electromagnetically cluttered environment is significantly easier than transmitting a high-powered military waveform in a restricted band. 
  1. Inherent resilience and anti-jamming properties: The Chirp Spread Spectrum technology provides frequency diversity, making the signal highly resilient to interference and signal corruption. The peer-to-peer mesh network capability – commonly seen in commercial Long-Range wide area network derivatives – ensures that if one node is lost, the network self-heals and dynamically reroutes transmissions, preserving communication integrity. 
  1. Exceptional size, weight, power, and cost: The commercially available chip-based design is smaller than a man’s finger, lighter than a cell phone, requires minimal power, and costs between $10-$125 depending on the chip or design kit desired. This allows a single operator to carry a disposable surplus, ensuring communication survival without adding significant weight or bulk. This disposability fundamentally changes the tactical risk calculation, prioritizing mission success over asset retention. 

A Call to Action: Spend to Save 

The United States will not be able to rely solely on long-distance sense capabilities outside of kinetic strike range if it wants to gain the operational tempo. Standard communication equipment does not protect those critical people able to go inside the weapons engagement zone from detection. Therefore, the American special operations enterprise must look at proliferating non-standard communication methods that allow its personnel to “hide in plain sight”. 

To address this capability gap, Special Operations Command must leverage its unique acquisition authority to immediately adopt a commercial, disposable mindset. This means bypassing rigid military specifications to focus on functional requirements (size, weight, power, and signature), purchasing raw, commercially available chips (like the Semtech SX1276), and integrating a custom-developed, secure software layer. Embracing this approach fundamentally changes the risk equation: losing $75 commercial radios is an acceptable tactical loss; losing highly trained special operations teams because their $20,000 radio betrayed their presence is an unacceptable operational failure. 

The adoption of inexpensive, low-power commercial solutions like LoRa is the clearest, fastest path for the Department of Defense to ensure its special operators can operate in the adversary’s electronic fog and maintain vital command and control. The next conflict will be won by the side that can communicate while remaining invisible. For a fraction of the cost of one traditional military radio, Special Operations Command can equip every operator with the electronic ghost needed to win. 

Note: The views expressed are those of the author and do not reflect the official position of the Naval Postgraduate School, Department of the Army, or Department of Defense. 

The post The $75 Radio: Why US Special Operations Command Needs to Buy Off the Shelf for the Next War appeared first on Small Wars Journal by Arizona State University.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Live Updates: U.S. Closes 2 Gulf Embassies as Iran Steps Up Retaliation

The State Department urged Americans to immediately leave 14 countries, and closed...

When Trump Meets Germany’s Merz, Iran Will Likely Dominate Discussion

Chancellor Friedrich Merz’s visit to Washington, long planned, is now likely to...

US House panel releases Clinton Epstein depositions

A US congressional committee investigating convicted sex offender Jeffrey Epstein released videos...

Inflation to hit eurozone as war in the Middle East disrupts energy flows

In the Middle East energy exports to Europe have been disrupted by...